Location-Query-Privacy and Safety Cloaking Schemes for Continuous Location-Based Services

被引:4
作者
Gutierrez-Soto, Claudio [1 ,2 ]
Galdames, Patricio [1 ,2 ]
Faundez, Carlos [2 ,3 ]
Duran-Faundez, Cristian [4 ]
机构
[1] Univ Bio Bio, Dept Sistemas Informac, Concepcion 4051381, Chile
[2] Univ Bio Bio, Grp Smart Ind & Complex Syst gISCOM, Concepcion 4051381, Chile
[3] Univ Bio Bio, Magister Ciencias Comp, Concepcion 4051381, Chile
[4] Univ Bio Bio, Dept Ingn Electr & Elect, Concepcion 4051381, Chile
关键词
K-ANONYMITY; PROTECTION;
D O I
10.1155/2022/5191041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, people can access a wide range of applications and services for mobile device users. Among them, location-based services (LBS), where the application needs the user's position to provide the service. Some examples of these applications are Uber and Waze. Nevertheless, the repetitive use of an LBS can reveal confidential user information; thus, behavior patterns-such as daily routes-could be deduced by some dishonest LBS. Furthermore, a query's keywords could provide information about a user's health status or future position when it inquires about hospitals or hotels. Therefore, an adversary can use this information for unethical purposes, and users need mechanisms that protect their privacy. At present, several approaches separately tackle location privacy, location security, and query privacy. To the best of our knowledge, no previous work deals with all these mentioned aspects simultaneously especially when users demand continuous protection when moving and accessing an LBS. This paper proposes two batch techniques to provide location privacy, location safety, and query privacy in an environment that considers a continuous LBS. These techniques apply l-diversity (query privacy) in a context that contemplates query semantics, as well as a diverse set of users' paths. Extensive experimentation shows that both techniques are cost-effective and scalable solutions that offer unified location privacy, query privacy, and location safety protection for many mobile users.
引用
收藏
页数:22
相关论文
共 35 条
[1]  
[Anonymous], 2006, VLDB, DOI DOI 10.1145/1620585.1620591
[2]  
Cheng R, 2006, LECT NOTES COMPUT SC, V4258, P393
[3]  
Chow Chi-Yin., 2006, P 14 ANN ACM INT S A, P171
[4]   Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services [J].
Cui, Yuanbo ;
Gao, Fei ;
Li, Wenmin ;
Shi, Yijie ;
Zhang, Hua ;
Wen, Qiaoyan ;
Panaousis, Emmanouil .
SENSORS, 2020, 20 (16) :1-17
[5]  
Decker M., 2008, P 2008 7 INT C MOBIL, P221, DOI 10.1109/icmb.2008.14
[6]  
Faundez C., 2020, P COLLABORATIVE TECH, P24
[7]   Batching Location Cloaking Techniques for Location Privacy and Safety Protection [J].
Galdames, Patricio ;
Gutierrez-Soto, Claudio ;
Curiel, Arturo .
MOBILE INFORMATION SYSTEMS, 2019, 2019
[8]   Protecting location privacy with personalized k-anonymity:: Architecture and algorithms [J].
Gedik, Bugra ;
Liu, Ling .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) :1-18
[9]   Anonymous usage of location-based services through spatial and temporal cloaking [J].
Gruteser, M ;
Grunwald, D .
PROCEEDINGS OF MOBISYS 2003, 2003, :31-42
[10]  
Ji YL, 2020, 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P742, DOI [10.1109/CCWC47524.2020.9031176, 10.1109/ccwc47524.2020.9031176]